Multiple format string vulnerabilities in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) 1.0.3, 0.9.5, and earlier and (2) iSCSI Enterprise Target (aka iscsitarget) 0.4.16 allow remote attackers to cause a denial of service (tgtd daemon crash) or possibly have unspecified other impact via vectors that involve the isns_attr_query and qry_rsp_handle functions, and are related to (a) client appearance and (b) client disappearance messages.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/57496 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=576359 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2010:131 | vendor advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=574935 | patch |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11248 | vdb entry signature |
http://secunia.com/advisories/39142 | third party advisory vendor advisory |
http://marc.info/?l=oss-security&m=127005132403189&w=2 | mailing list |
http://www.securityfocus.com/bid/39127 | vdb entry |
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html | vendor advisory |
http://git.kernel.org/?p=linux/kernel/git/tomo/tgt.git%3Ba=commit%3Bh=107d922706cd36f3bb79bcca9bc4678c32f22e59 | |
http://www.debian.org/security/2010/dsa-2042 | vendor advisory |
http://www.vupen.com/english/advisories/2010/1786 | vdb entry |
http://secunia.com/advisories/39726 | third party advisory |